Earlier this year, Moka5 conducted a survey about how enterprises are currently using cloud-based services and how they would prefer to use them. The results are in and the findings are eye opening. Join Moka5 VP of Marketing Kris Bondi for an overview of the adoption and usage trends as well top-of-mind security concerns for IT decision makers.

If you have been tasked with building an application security program, or your organization is starting to consider one, you may be curious where to start.

Not only does application security rely on sound security understanding, it also relies on a fundamental understanding of software development. You must consider things like budget, or lack thereof, resources, priorities, and strategy when building an application security program.

In this talk, James Jardine, CEO of DevelopSec, will talk about these different considerations when just getting started. Come learn some of the key elements to helping get your application security program started in the right direction.

James Jardine is CEO of DevelopSec, owner of Jardine Software, an application security consultancy, as well as founder and regular contributor to Down the Security Rabbit Hole and DevelopSec podcasts. He has over 16 years experience focusing on application security and software development. James is a regular keynote speaker, including InfoSec World 2017.

Microservices architectures provide unprecedented agility and scalability for enterprise applications. However, despite being so popular with the tech community, not everyone understands when or how to use microservices to innovate their IT architecture. So what does it take to become faster and more resilient in the digital transformation era? Join this panel and learn more:

- What are the benefits of adopting microservices?
- Are microservices for everyone?
- Are microservices a good fit for legacy architectures?
- How to use microservices for innovation purposes?

The adoption and popularity of containerized applications has exploded in recent years. According to Gartner, more than 50% of new workloads will be deployed in containers by 2018.

But where does that leave the other 50%? How are virtual machines measuring up and how will applications built on these infrastructures survive the digital transformation caused by Docker and other container platforms?

Join this expert panel discussion with Tarak Modi, President & CTO of TekNirvana, Swen Conrad, CEO of Ocean9, and Phil Mullan, Head of Engineering at Huddle, to discuss which IT infrastructure makes the most sense for your business in the digital age, and the pros and cons of different operating systems.

The adoption of new approaches to business is accelerating fast and what ‘digital transformation’ means is changing at an astonishing rate. We already have legacy implementations and lots of fragmentation from early forays into cloud services. How do we execute a new transformation strategy while trying to manage multiple platforms from mainframe to legacy cloud?
​
Engaging multiple disciplines and technologies and driving change rapidly whilst continuing to operate a business dependent on legacy systems requires significant cultural change and while much of this must come from within the business, there is a real opportunity for CIOs to create and own the digital agenda. In this session, Simon will examine different approaches to people, process and technology that can be used to enable a coherent transformation strategy.

The microservice architecture has become an established and powerful way to structure large scale systems, providing a component model that scales both at the human and system levels. It is by nature an architecture that has lots of small parts. And it's easy to make a big
mess with lots of little things.

Complexity has moved into the network. That's a better place for it than unreadable code. But you still need to know how to manage that complexity. What are the patterns that you use to build message flows between services? What are the ways that those messages flows will
fail? Are they scalable? How do you distribute complexity evenly?

To answer these questions, you need to be able to visualize your microservice interactions, so you can describe them and make them accessible. This talk provides practical answers to
those questions, provides you with a method for designing microservice architectures, and introduces a new visual syntax to describe them.

Speaker's bio:
Richard Rodger is a co-founder of nearForm.com. Richard is an expert and thought-leader in next-generation enterprise software delivery, with a focus on Node.js and microservices. He is currently writing The Tao of Microservices (available on early release from manning.com/books/the-tao-of-microservices), a comprehensive guide to designing and
building microservice systems. His first book Mobile Application Development in the Cloud (Wiley, 2010) is one of the first major works on the intersection of Node.js, Cloud, and Mobile.
Richard was previously CTO of FeedHenry, a mobile application platform provider that was acquired by RedHat for €63.5m in 2014.
Since Richard co-founded nearForm in 2011, the company has become the world’s largest Node.js and microservices consulting company.

Docker containers are changing the way we build, deploy, and access current day software solutions. They help us build, share and use software across any device, on any platform and anywhere in a seamless manner. In this session, you will see how to dockerize a basic piece of software, pushing it to the docker registry and pulling other docker images into your system.

Please join us, on August 24th, at 10:30 AM PT, for a Webinar on how to confidently secure Docker on AWS.

Docker adoption has surged, up 40% over the past year, taking the lead for DevOps tools on AWS. With this transformation, enterprises are looking for ways to confidently introduce Docker into their Cloud environment. Join us as Cavirin experts guide you through:

> Securing EC2 Container Services, as well as Docker images, brought in from different registries
> Integrating CloudTrail and CloudFormation
> Today's best Docker security practices on AWS
> The latest on Kubernetes

Attend the AWS Docker Webinar and a chance to win Snapchat Spectacles.

Octane I/O provides an enterprise grade, near real time integration of HPE ALM or HPE Octane with four popular Agile development tools (Atlassian JIRA, Microsoft TFS, CA Agile Central/Rally and VersionOne). This webinar will provide:

•High level introduction to the new synchronization offering
•Sampling of integration use cases between HPE tools and 3rd party Agile tools
•Technical demo of HPE ALM Octane I/O
•Details for accessing your licenses
•Where to get more information

You'll have everything you need to quickly get HPE ALM or Octane connected to your Agile tools.

Join this webinar to hear a panel of experts that recently led a discussion at the Delaware Local User Group meeting. Each of these experts will provide examples of what most organizations are facing today, why security should be important to you, and how you can mitigate these security risks now. You will leave the webinar with immediate actions you can use.

Pretotyping is a growing technique for fast innovation, faster than developing an MVP. Pretotying is about doing the hardest part first, and the hardest part is almost always getting people to change their habits and try something new. Pretotyping allows you to experiment cheaply and look for market signals that you can then build into.

In this one-hour webinar, you'll learn what pretotyping is, the six main forms, how to iterate quickly, and much more. You'll learn why pretotyping is usually better than building a prototype or an MVP, and how several of today's successful products came out of a pretotyping experiment. Applies equally to physical and digital products and services.

This is for anyone interested in fast innovation: start-ups, marketers, intrapreneurs, product managers, and more. Pretotyping is a powerful tool that should be in every innovator's toolkit.

David Siegel is a Silicon Valley serial entrepreneur living in Switzerland. He played a significant role in the development of the Worldwide Web, has written five books, and coaches startups. He is now leading an open-innovation company focused on blockchain and the decentralized economy.

Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
----------
In this interview, Simon Ractliffe, Principal Consultant & IT Evangelist, Ensono, shared with us ideas, recommendations and best practices on how to deliver DevOps in a legacy world.

Among topics discussed:

- Is DevOps for the legacy world?
- What are the challenges of DevOps for legacy systems?
- What makes the delivery of DevOps in a legacy world so different from the other worlds (start-up world, continuous delivery world, growth world etc?)
- Case examples in which legacy organisations thrived or failed from adopting DevOps
- And others

About the Speaker:
For publications see Simon's author page on the Digital Transformation People - http://www.thedigitaltransformationpeople.com/authors/simon-ratcliffe

Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
----------
In this interview, Sandra Bell, Head of BC & ISDG Consulting (Europe), Sungard, will share with us how tech innovations impact the moderb BCDR strategies.

Topics up for discussion:

- Innovations in the cloud and BCDR
- Critical things to know when creating a BCDR strategy
- Latest trends in disaster recovery
- Business continuity and digital transformation
- Technology recovery solutions and local resilience strategies
- And others

About the Speaker:
Sandra is a seasoned risk and business continuity professional with over 25 years’ experience of the design and management of strategic, business friendly risk, continuity and security solutions in public and private sectors. Experience ranges from: the management of risk and the protection of data within the UK’s main business process outsourcer to the financial and government sectors; to the protection of the largest part of the UK’s critical national infrastructure.

Jason talks about his experience in developing cross-platform, native apps - the various tools that can be used to produce them, common misconceptions and mistakes, design and development approach, coding, commercial arrangements, publishing and delivery etc.

Physical and technological changes in computing and data storage have led us down a winding road to DevOps, which brings us to where we are today. Let’s take a brief look at the evolution of cloud hosting, from colocation to today’s cloud services, and the impact of these changes on IT decision-making.

Join this webcast with Sin-Mei Tsai, VP of Engineering along with Gavin Butler, Lead Site Reliability Engineer at Shippo, for a technical deep-dive into cloud applications and operations of yesterday, today and tomorrow.

The growing popularity of object-based storage has resulted in the development of Ethernet-connected storage devices, herein referred to as IP-Based Drives and subsystems supporting object interfaces and in some cases the ability to run localized applications.
Typical scale-out storage nodes consist of relatively inexpensive enclosures with IP network connectivity, CPU, Memory and Direct Attached Storage (DAS). While inexpensive to deploy, these solutions become harder to manage over time.
To ease management of these drives, SNIA has approved the release of the IP-Based Drive Management Specification. In this webcast, you’ll hear from authors of the specification who’ll discuss:

• Major Components of the IP Based Drive Management Standard
• How the standard leverages the DMTF Redfish management standard to manage Kinetic and other IP-Based Drives
• Providing a standard management interface for drives that are part of JBOD or JBOF enclosures

By driving containerized microservices into production, architecture and project teams are learning how to decompose monoliths, rapidly compose business solutions, and achieve greater resiliency. The transition requires teams to reinvent their application, reshape their architecture, and refresh their technology platform.

In this session, Chris Haddad, Chief Architect at Karux, will share how enterprise architecture teams chose their container platform, refactored their application portfolio, and accelerated development with API-first practices. Learn how you can establish a roadmap, craft an implementation plan, and acquire necessary skills.

When it comes to mobile applications for enterprise, mobile developers are required to deliver cross-platform mobile apps with powerful backends, insightful user analytics and engaging notifications, all while keeping development costs to a minimum. In this session, find out how to mobilize and modernize your apps fast with Telerik Platform and learn more on NativeScript, a powerful open-source cross-platform framework for building native apps.

Hrishikesh Barua, Director of Engineering at Imaginea Technologies where he leads the Cloud and DevOps practice

Application containers are changing the way software is built and deployed. Managing and scaling application containers pose different challenges from that of traditional infrastructures. In this webcast we look at Kubernetes, an open source container cluster manager and how it simplifies automation, operations and scaling of containers.

Revisions to PCI (Payment Card Industry) DSS (Data Security Standard) point toward the realization that security must be built into the development process and Cloud with SAAS computing.

Medical software and hardware, mobile applications, IoT etc. will require a new approach. This is frequently referred to as Rugged DevOps or SecDevOps, and the different approach called DevSecOps, embracing the speed of DevOps and continuous delivery in a secure environment. DevOps does affect security, and you can use it to your advantage. As cloud, big data and DevOps disrupt traditional approaches to security, new capabilities emerge to automate and enhance security operations.

Join this session and learn how to automatically address these data security blind spots and how security can be built into the development process and IT platforms. We will discuss how security can be built into Rugged DevOps,SecDevOps, DevSecOps, Scrum, SAFe, DAD and use in Large-scale Development.